Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

After IPsec is deployed on an enterprise network, services are interrupted. The administrator finds that no data flow triggers IKE negotiation.

Which of the following are possible causes?(Select all that apply)

A.

Configuration error of an interzone security policy

B.

An unreachable route

C.

The IPsec policy is not correctly applied to the related interface.

D.

A mismatch between the ACL and protected data flow

Which of the following community attributes enables a device to send a received route with this attribute toany BGP peer?

A.

No_Advertise

B.

Internet

C.

No_Export

D.

No_Export_Subconfed

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicastdata properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

A.

TRUE

B.

FALSE

Which of the following configurations are not mandatory when an administrator configures VRRP?

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

A.

TRUE

B.

FALSE

Which of the following statements about BFD operating modes are true?

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detectiontime, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.